mirror of
https://github.com/grafana/grafana.git
synced 2024-11-29 20:24:18 -06:00
f4f0d74838
* Add context to user * Add context for enterprise * Add context for UpdateUserLastSeenAtCommand * Remove xorm
69 lines
2.1 KiB
Go
69 lines
2.1 KiB
Go
package auth
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
"github.com/grafana/grafana/pkg/services/sqlstore"
|
|
)
|
|
|
|
func (s *UserAuthTokenService) Run(ctx context.Context) error {
|
|
ticker := time.NewTicker(time.Hour)
|
|
maxInactiveLifetime := s.Cfg.LoginMaxInactiveLifetime
|
|
maxLifetime := s.Cfg.LoginMaxLifetime
|
|
|
|
err := s.ServerLockService.LockAndExecute(ctx, "cleanup expired auth tokens", time.Hour*12, func(context.Context) {
|
|
if _, err := s.deleteExpiredTokens(ctx, maxInactiveLifetime, maxLifetime); err != nil {
|
|
s.log.Error("An error occurred while deleting expired tokens", "err", err)
|
|
}
|
|
})
|
|
if err != nil {
|
|
s.log.Error("failed to lock and execute cleanup of expired auth token", "error", err)
|
|
}
|
|
|
|
for {
|
|
select {
|
|
case <-ticker.C:
|
|
err = s.ServerLockService.LockAndExecute(ctx, "cleanup expired auth tokens", time.Hour*12, func(context.Context) {
|
|
if _, err := s.deleteExpiredTokens(ctx, maxInactiveLifetime, maxLifetime); err != nil {
|
|
s.log.Error("An error occurred while deleting expired tokens", "err", err)
|
|
}
|
|
})
|
|
if err != nil {
|
|
s.log.Error("failed to lock and execute cleanup of expired auth token", "error", err)
|
|
}
|
|
|
|
case <-ctx.Done():
|
|
return ctx.Err()
|
|
}
|
|
}
|
|
}
|
|
|
|
func (s *UserAuthTokenService) deleteExpiredTokens(ctx context.Context, maxInactiveLifetime, maxLifetime time.Duration) (int64, error) {
|
|
createdBefore := getTime().Add(-maxLifetime)
|
|
rotatedBefore := getTime().Add(-maxInactiveLifetime)
|
|
|
|
s.log.Debug("starting cleanup of expired auth tokens", "createdBefore", createdBefore, "rotatedBefore", rotatedBefore)
|
|
|
|
var affected int64
|
|
err := s.SQLStore.WithDbSession(ctx, func(dbSession *sqlstore.DBSession) error {
|
|
sql := `DELETE from user_auth_token WHERE created_at <= ? OR rotated_at <= ?`
|
|
res, err := dbSession.Exec(sql, createdBefore.Unix(), rotatedBefore.Unix())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
affected, err = res.RowsAffected()
|
|
if err != nil {
|
|
s.log.Error("failed to cleanup expired auth tokens", "error", err)
|
|
return nil
|
|
}
|
|
|
|
s.log.Debug("cleanup of expired auth tokens done", "count", affected)
|
|
|
|
return nil
|
|
})
|
|
|
|
return affected, err
|
|
}
|